Home / / St. Louis, MO

St. Louis CyberSecurity Conference

Wednesday, July 13, 2022 CT

Live in Person @ Hilton St. Louis Frontenac

Parking and Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

“What is cyber security anymore; and how will it continue to be defined?”

Brent Bettis

VP, Information & Operations Technology Services & CISO Peabody Energy

Brent Bettis is Vice President, IT Services & Chief Information Security Office for Peabody. Brent has global responsibility for Peabody’s IT/OT strategy, resources, and technology innovation. In this role, he establishes enterprise architecture and technology roadmaps to align IT/OT resources to maximize business value from technology solutions. Furthermore, he is responsible for establishing and maintaining the cyber security vision for mining and corporate technology solutions.

Brent has over 20 years of experience in systems architecture, IT strategy and cyber security, including 7 years at Peabody. In addition to cyber security and systems architecture, he also has extensive expertise in the areas of digital strategy, crisis management, portfolio management, risk advisory and business transformation. Brent has been instrumental in driving Peabody’s digital transformation and was instrumental in setting the strategic direction for Peabody’s cyber security program. Prior to Peabody, Brent held IT leadership positions in the consulting, energy and Department of Defense sectors.

Brent holds a Bachelor of Science degree from Southern Illinois University and a Master of Arts degree in Computer Resources and Information Management from Webster University in St. Louis, Missouri. Additionally, he has been a Certified Information Systems Security Professional (CISSP) since 2006.

Peabody (NYSE: BTU) is a leading coal producer, providing essential products for the production of affordable, reliable energy and steel. Our commitment to sustainability underpins everything we do and shapes our strategy for the future.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Marc Ashworth

Chief Information Security Officer - Senior VP
First Bank

Bio

Zachary Lewis

Assistant Vice President Information Technology and CISO
University of Health Sciences and Pharmacy in St. Louis

Bio

Tim Marsden

Chief Information Security Officer
Stifel Financial Corp.

Bio

Rebecca Harness

VP, Chief Information Security Officer
Quickbase

Bio

Andrew Wilder

Vice President and Chief Information Security Officer
Hillenbrand

Bio

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am – 9:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am – 9:30 am

Zero Trust for Applications

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

Chad Maskill

Cyber Hero ThreatLocker
Bio

Presentation

9:30 am – 10:00 am

Key Considerations for Choosing the Right Email Security Platform

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.

Unfortunately, email threats are only growing in number. Business email compromise accounts for 44% of all losses to cybercrime, and the 2021 Verizon DBIR holds that phishing remains the top entry point for breaches—a position it has held for years.

Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense.

Scott Deluke

Manager, Enterprise Engineers Abnormal
Bio

Networking

10:00 am – 10:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am – 11:00 am

It Takes More than Automated Compliance to Get Ahead of Threats

In a 2021 survey of CIOs, respondents cited limited resources, new or changing regulations and tracking and maintaining compliance as the top three challenges keeping them up at night. With teams stretched thin trying to keep up with compliance requirements and growing numbers of threats and stakeholder demands, manual processes can no longer keep up. 

Automation is a strong first step in reducing manual work and freeing up your team’s workload.  However, it is insufficient if it doesn’t help your InfoSec leaders clearly communicate the risk associated with the organization’s business priorities so they can make informed, data-driven investment decisions. 

The ability to focus on strategic business priorities helps optimize the talents of small InfoSec teams. When you automate the more tactical and routine work, a more reliable and comprehensive approach to GRC is created while optimizing your teams’ talent by freeing them from manual work. 

Join us as we discuss how taking a strategic approach to risk management combined with automation can ensure that businesses stay ahead of the threats they face every day.

 Attend this webinar and learn how to:

  • Focus your planning efforts around your organization’s strategic business priorities 
  • Be more proactive by automating evidence collection, risk scoring and monitoring 
  • Gain actionable insights to help you clearly communicate with key stakeholders

Meghan Maneval

Director of Technical Product Management Reciprocity
Bio

Presentation

11:00 am – 11:30 am

Stopping Attacks, Not Your Business: AI & Autonomous Response

Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.

Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken

Quinn Wright

Cybersecurity Account Executive Darktrace
Bio

Networking

11:30 am – 11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Break

11:45 am – 12:00 pm

Lunch

Keynote

12:00 pm – 1:00 pm

“What is cyber security anymore; and how will it continue to be defined?”

Brent Bettis

VP, Information & Operations Technology Services & CISO Peabody Energy
Bio

Networking

1:00 pm – 1:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm – 2:00 pm

Is Your Defensive Stack Ready For A Targeted Attack?

Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing tools and controls to the test, and focusing on impact-based remediation vs. generic severity to make decisions. We will discuss in depth how taking an offensive approach, through Automated Security Validation, enhances a team’s current defensive strategies.

Autumn Stambaugh

Solutions Engineer Pentera
Bio

Presentation

2:00 pm – 2:30 pm

Cameras, CACs & Clocks: Enterprise IoT Security Sucks - A Story of Two Million Interrogated Devices

Enterprise Internet of Things (IoT) security today is analogous to IT security in the mid 1990s. It was a time when security awareness was limited, countermeasures and best practices weren’t broadly applied, and attackers explored, compromised, controlled, and exfiltrated data from systems with minimal resistance. In short, enterprise IoT security sucks as bad today as that unpatched Windows NT 3.51 server with an RS-232 connected modem that IT forgot about.

Working globally with Fortune 500 enterprises and government agencies for the past six years, we’ve interrogated over two million production IoT devices. Across these two million devices we’ve identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. We’ve also assembled tactics that organizations can employ to recognize value from their IoT devices while minimizing risk and ensuring that devices that are secure today will stay secure tomorrow.

Brian Contos

Chief Security Officer Phosphorus Cybersecurity
Bio

Networking

2:30 pm – 2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm – 3:15 pm

Why do we accept gaps in our data protection practices

For years, organizations have struggled to meet the requirements of regulatory compliance, incident response, security and best practice for their critical data.

And now, with the huge upsurge and modernization of business applications and the pressure to migrate to the cloud or to manage a hybrid environment, data security and compliance requirements are evolving to the point where traditional solutions are no longer enough to provide every answer, and the demand for a modernized data security solution is growing .

Modern Data Security requires:

  1. Support for any location, Multi-cloud, on-prem, both.
  2. Coverage for any data type
  3. Augmenting hard to find expertise
  4. Building Data security into Business Processes

Join Imperva’s Terry Ray to learn what to consider when modernizing your data security solutions to meet the constantly changing security challenges of the modern enterprise.

Terry Ray

SVP Data Security GTM and Field CTO Imperva
Bio

Presentation

3:15 pm – 3:45 pm

Cyber Insurance Meets Security Operations

Cyber Insurance is critical to enterprise risk management strategies. Taking the time to understand your policy and knowing what to expect when there is an incident are equally important.

Join Us to Discuss

  1. Lessons learned from recent incident investigations
  2. What to expect when you file a cyber insurance claim
  3. Which security controls are the most important

Hugh Docherty

Director & Security Awareness Coach Arctic Wolf
Bio
Arctic Wolf Logo

3:45 pm – 4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm – 5:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Marc Ashworth

Chief Information Security Officer - Senior VP First Bank
Bio

Zachary Lewis

Assistant Vice President Information Technology and CISO University of Health Sciences and Pharmacy in St. Louis
Bio

Tim Marsden

Chief Information Security Officer Stifel Financial Corp.
Bio

Rebecca Harness

VP, Chief Information Security Officer Quickbase
Bio

Andrew Wilder

Vice President and Chief Information Security Officer Hillenbrand
Bio

Closing Remarks

5:00 pm – 5:15 pm

Closing Remarks

Register

Share This